MAL-2024-12296

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/jupphelp/MAL-2024-12296.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2024-12296
Published
2024-08-10T16:25:59Z
Modified
2025-12-12T20:38:05.903210Z
Summary
Malicious code in jupphelp (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (dcda51f3ac0b82ef824630ce053d4dc42aa2021baf16e476ca83ef8d7f7c1cab)

Once run, downloads and install from sleipnirbrowser[.]org a suspicious executable pretending to be a webbrowser. This website appears to be a scam using some kind of crypto tokens, and trying to impersonate a legitimate Slepnir web browser (https://en.wikipedia.org/wiki/Sleipnir_(web_browser)).

Later versions switched to install a software identified as LUMMA infostealer (e.g. https://tria.ge/240817-whze2aydkc), hidden in different executables


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2024-08-sleipnirbrowser-web3

Reasons (based on the campaign):

  • Downloads and executes a remote executable.

  • dependency-confusion

  • crypto-related

  • modify-system-without-consent

  • impersonation

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/2024-08-sleipnirbrowser-web3/jupphelp",
            "import_time": "2025-12-02T22:30:55.288256762Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "source": "kam193",
            "modified_time": "2024-08-10T16:25:59Z",
            "sha256": "eabfeab24c4de1451619c0588b65955da3b6ab4e6cfe5db4fdd48f6ef785d03c"
        },
        {
            "id": "pypi/2024-08-sleipnirbrowser-web3/jupphelp",
            "import_time": "2025-12-02T23:07:18.312326506Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "source": "kam193",
            "modified_time": "2024-08-10T16:25:59Z",
            "sha256": "dcda51f3ac0b82ef824630ce053d4dc42aa2021baf16e476ca83ef8d7f7c1cab"
        },
        {
            "id": "pypi/2024-08-sleipnirbrowser-web3/jupphelp",
            "import_time": "2025-12-10T21:38:57.557512921Z",
            "source": "kam193",
            "modified_time": "2024-08-10T16:25:59Z",
            "sha256": "1e21360df6072212b4970cc75a78f3e4538ba09a4b6c4ccc54b9f40925099488",
            "versions": [
                "0.1.0"
            ]
        }
    ],
    "iocs": {
        "domains": [
            "sleipnirbrowser.org"
        ],
        "urls": [
            "https://sleipnirbrowser.org/api/python/14526470/win",
            "https://sleipnirbrowser.org/api/python/79D83767/mac",
            "https://sleipnirbrowser.org/api/python/79D83767/win"
        ]
    }
}
References
Credits

Affected packages

PyPI / jupphelp

Package

Affected ranges

Affected versions

0.*
0.1.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/jupphelp/MAL-2024-12296.json"